Uploaded by Milan Sajeewa

network-assignment

advertisement
INTERNATIONAL COLLEGE OF BUSINESS & TECHNOLOGY LTD
ASSIGNMENT BRIEF
PROGRAMME
HND Computing and system development / Software Development
UNIT NO
24
UNIT TITLE
Networking Technologies
ASSIGNMENT NO
01
ASSIGNMENT
TITLE
Building a Computer Network for ICBT campus.
INDIVIDUAL/
Individual
WORD COUNT
-
STUDENT ID
HND/COM/11/
INTERNAL
VERIFIER
Prabu Premkumar
GROUP
STUDENT NAME
ASSESSOR
N Deenadayalan
DATE SET
18/05/2016
SUBMISSION DATE
12/06/2016
RESUBMISSION
DATE
SUBMITTED DATE
RESUBMITTED
DATE
FINAL GRADE
ORIGINAL
RESUBMISSION
UNIT OUTCOMES COVERED
LO1 Understand networking principles
LO2 Understand networking components
LO3 be able to design networked systems
LO4 be able to implement and support networked systems
AUTHENTICITY STATEMENT
I,.................. hereby confirm that this assignment is my own work and not copied or plagiarized. All the
sources, from which information has been obtained for this assignment, have been referenced. I further
confirm that I have read and understood the rules and regulations out plagiarism and copying and agree
to be bound by them.
LEARNER SIGNATURE:
DATE:
2
Grading
opportunities
available/achieved
L01.
1
L01.2
L01.3
L02.1
L02.2
L02.3
L03.1
L03.2
L04.1
L04.2
D1.3
D2.3
D3.6
Original Submission
Re submission
SIGNATURE:
Grading
opportunities
available/achieved
DATE:
L04.3
L04.4
L04.5
M1.1
M2.5
M3.1
Original Submission
Re submission
3
Scenario
Background
The ICBT campus is an educational institute company that provides educational trainings, online exams
on Information Technology, which has more than 2000 students in a one year of time. The company's
primary business since 2000 has been providing computer services for customers.
The company head office is the main place, which control courses. Addition to that the company has IT
division, Vocational Training division, Undergraduate/Postgraduate centre. There is a Manager for each
division.
Users & Scalability of Divisions

Head office
200 Computers

Vocational Training Division
85 Computers

Undergraduate/Postgraduate center
130 Computers

IT Division
125 Computers
Chairman - (Head Office)
All the divisions must be interconnecting after the computerization project. If a student wants to
communicate with their lectures or with management there must be a way to communicate, during
4
office hours. Online practical booking system and online payments should be possible. Currently
telephone bills are in a high rate. After completing the computerization project a better communication
is needed in a low cost. Requirement of students and management should be satisfied without
violations.
The employees will have separate logins and will be provided a common network drive where they
can store their files, and the drive can be accessible from anywhere inside the company. We need
to implement the remote accessibility feature for some of the employees to access the company
network from outside.
5
Undergraduate/Postgraduate centreIt has two main sub divisions
Sub Divisions

Kids Division Coordinator
We are having 30 personal computers. The growth of division has made the requirement of
networking. In near future we are planning to implement new online courses for kids & they will
have online exams on their courses.

Multimedia Division Coordinator
We are having 35 PCs and they do not have network connections on those. Growth of the needs
(Such as high capacity files) has made the requirement of a LAN.
We are now planning to implement our network. Communication with Head office for course details
updates & accounting requirements is a cost effective thing, Due to the long distance
telecommunication.
The management of the company wants you to design a suitable network for them. You have been
appointed as the Manager for the Computerization Project of the company's enterprise network.
The ICBT campus management has requested you to research and produce a report for areas mentioned
below.
Note 1: - All answers should be based on the above scenario.
6
7
Tasks
1. Choose the right network architecture and the physical topology you would propose for the above
company’s network technologies network. Discuss the benefits and limitations of your
recommendations. (LO1.1)
2. Evaluate the impact on current technology standards and suggest one or more standards to the
organization. (LO1.2)
3. Explain different routing protocols and choose appropriate one for the above scenarios?(LO1.3)
4. Critically discuss and select suitable hardware and software components needed for the above
network infrastructure along with their functions. (LO2.1)
5. Discuss different between client and server machine, select different types of servers that is
needed for the organization justify why? (LO2.2)
6. Discuss about the workstation hardware that you have chosen for the organization and give more
emphasise to network compatibility (LO2.3)
7. Design a suitable network for your organization (LO 3.1)
8. Critically evaluate and justify the network design that has been created. Identify some
applications for each department and then apply some required policies to control particular
Domain users according to department requirement. Then get the feedback and document the
related issues if found (LO 3.2)
9. Show the process of installing a server OS and setting up Active directory and DNS(LO4.1)
10. Demonstrate how you will add a workgroup computer to the domain you created by assigning
appropriate IP address to the client pc and create network drives.(LO4.1)
11. Demonstrate the process of installing and configuring relevant servers needed for the
organization(LO4.1)
 Provide a necessary network policy in selecting and configure relevant servers (M1.1)
12. Test your network to check if the system fulfils the user requirements and use a proper testing
strategy (LO4.2)
13. Record and analyse your test results with the expected outputs. Discuss your findings.(LO4.3)
14. Recommend the enhancements you could include into this network in terms of hardware
,software , design and technology (LO4.4)
 Discuss most efficient and proper methods for remote accessibility (D3.6)
15. Design a maintenance schedule to support the network system which should include backups,
upgrades, security and auditing policy.(LO4.5)
Used appropriate method for backups, upgrades, security and auditing policy for you case study
and justify why? (M2.1)
16. Self –evaluate your work related to this assignment by providing detailed lesson learned report
(D1.3)
17. Provide a detailed description how you have planned managed the activities of assignment
within the given time frame (D2.3)
18. The written tasks of the assignment must be delivered in a proper and standard report format
(M3.1)
8
Note: Task 9,10,11,12 is covered in the practical evaluation test.
Books
Burgess M – Principles of Network and System Administration, 2nd Edition (John Wiley and Sons Ltd,
2003) ISBN 0470868074
Hallberg B – Networking: A Beginner’s Guide, 4th Edition (Osborne/McGraw-Hill US, 2005) ISBN
0072262125
Limoncelli T and Hogan C – The Practice of System and Network Administration (Addison Wesley, 2001)
ISBN 0201702711
Lowe D – Networking All-in-One Desk Reference for Dummies, 2nd Edition (Hungry Minds Inc US, 2005)
ISBN 0764599399
More M, Southwick P, Pritsky T and Riggs C – Telecommunications: A Beginner’s Guide (McGraw- Hill
Education, 2001) ISBN 0072193565
Olifer N and Olifer V – Computer Networks: Principles, Technologies and Protocols for Network Design
(John Wiley and Sons Ltd, 2005) ISBN 0470869828
Schiller J – Mobile Communications, 2nd Edition (Addison Wesley, 2003) ISBN 0321123816
Subramanian M – Network Management: An Introduction to Principles and Practice (Addison Wesley,
2000) ISBN 0201357429
Websites
www.cisco.com
www.howstuffworks.com
www.webopedia.com
9
Instruction to Students
1. Please fill all the required entries on assignment cover sheet (Student Name, Student Number,
Assessor’s name, Date submitted).
2. It is a MUST to maintain the word count specified (10% variation is acceptable). Not meeting the
criteria for word count can result a penalty.
3. Answers should be clear, specific and self - reflective.
4. DO NOT COPY answers from Internet instead, paraphrase and quote using proper ways.
5. In-text citation and referencing should be done using Harvard Referencing System.
6. Please be cautious about the structures of the report and the essay.
7. Your Word documents can be in Word 2010 or an earlier version, and must be given filenames of
the following format:
8.
[Module Name] [Batch No] [Student Edexcel No] March 2015 [ICBT Number] [Student
name].doc
Eg: Network technology NW 70 Dec 2015 C/HND/NET/04/01-Ex1234 Weerakoon.doc”
9. Report need to be produced with academically accepted formatting guidelines.
a. Paper A4
b. Font size : Headings 14pt, Bold; Normal font 12pt
c. Font Face: Times New Roman or any other Serif Font face.
d. Page Layout
i. Margins Left 1.5”, right, bottom and top 1”
ii. Page numbering bottom, right
iii. Line spacing 1.5
e. Headings, Sub headings, figures and tables need to be numbered and labelled. If taken
from another source, citation should be given at the bottom of the figure/table.
10. Please note that institute has very strict regulations on unfair practice and failing to follow
regulations can result serious penalties. (refer to the student handbook for further details)
GRADE DESCRIPTORS - This assignment provides opportunities to achieve a tick in all three merit grade
descriptors and all three distinction grade descriptors
10
Outcomes/Criteria for PASS
Evidence
LO1 Understand networking principles
Identify the correct
requirements, and should show
the Benefits of having a network.
1.1 Discuss the benefits and constraints
of different networking systems
types and topologies
1.2 Evaluate the impact of current
network technology,
communication and standards
Properly make a discussion on
IEEE standards and suggest the
suitable one for the organization.
1.3 Discuss how protocols enable the
effective utilization of different
networking systems
Discuss the usages of required
protocol for the organization.
LO2 Understand networking
components
You need to show valid point on
software and hardware selection
with acceptable cost benefit
analysis.
2.1 Discuss the role of software and
hardware components
2.2 Discuss server types and selection
requirement
Discuss all required type of
servers and their needs to the
organization.
2.3 Discuss the inter-dependence of
workstation hardware with network
components
Make appropriate Hardware
selection for client pcs.
Page
no
Comments
11
LO3 Be able to design networked
systems
3.1 Design a networked system to meet
a given specification
Design your network diagram
and make clear discussion. Used
MS Visio
Software
3.2 Evaluate the design and analyse
user feedback
Show each valid polices that set
on this domain and feedback that
you collected.
LO4 Be able to implement and support
networked systems
Need to provide required valid
screenshots for your installation.
4.1 Implement a networked system
based on a prepared design
Observation Records
4.2 Test the network system to meet
user requirements
4.3 Document and analyse test results
against expected results
4.4 Recommend potential
enhancements for the networked
systems
Written Report
Attach your lesson learned sheet
Written Report
You can provide some good
advance technology for the ICBT
campus for future references.
12
4.5 Design a maintenance schedule to
support the networked system.
Written Report
Grade descriptors for MERIT
Evidence
M1 Identify and apply strategies to
find appropriate solutions.
Observation Records:
M1.1 Effective judgments have been
made
M2 Select/ design and apply
appropriate methods/techniques
M 2.1 The design methods/techniques
has been justified
M3 Present and communicate
appropriate findings
M3.1 The appropriate Structure and
approach has been used.
Write a proper report by
mentioning network admin’s
responsibilities also acceptable
maintain plan.
Page
no
Comments
Page
no
Comments
Effective decision in selecting and
configuring relevant servers.
Written Report:
Effective maintenance schedule
for the organization
Written Report:
Proper and standard report
format. Justify your sever OS
selection and discuss about your
user groups and organization
unite (OU).
Provide suitable Harvard
references list and citations
Grade Descriptors for DISTINCTION
Evidence
D1 Use critical reflection to evaluate
own work and justify valid conclusions
Written Report:
D1.3Self – Criticism approach has taken
place
D2 Take responsibility for managing
and organizing activities
Lesson learned report should be
attached with proper conclusion
Written Report:
13
D2.1 Autonomy/independence has
been demonstrated
Practical Observation and
student must show proper screen
shots for his/her own work.
D2.3 Activities have been managed
Identify activities, plan and tasks
for the organization
D3 Demonstrate convergent/ lateral /
creative thinking
Written Report:
D3.6 Receptiveness to new ideas is
evident
Detail recommendations on the
appropriate and innovative use
of latest and emerging network
technologies for the proposed
network
14
Module name / No : ………………………………………………..
Student Name
: ………………………………………………..
Student Number
:……………………………………………...…
Assessor Name
:………………………………………………..
Date
Area Covered
Feedback
Signature of the
Assessor
15
Student signature ………………………………………
Date……………………
16
Table of Contents
Acknowledgement .............................................................................................................................. 19
Task 01 ........................................................................................................................................................ 20
1.1 Discuss the benefits and constraints of different networking systems types and topologies ............. 20
1.2 Evaluate the impact of current network technology, communication and standards ............................. 29
1.3 Discuss how protocols enable the effective utilization of different networking systems The ability to
provide flexible connectivity options while keeping closed user groups (groups of users and resources
isolated from non-group members) is vital in today's campus networks ..................................................... 32
Task 02 ........................................................................................................................................................ 34
Task 03 ........................................................................................................................................................ 46
3.2 Evaluate the design and analyses user feedback.................................................................................... 49
Task 04 ........................................................................................................................................................ 52
4.3 Document and analyses test results against expected results ............................................................ 56
4.4 Recommend potential enhancements for the networked systems ..................................................... 58
References ................................................................................................................................................... 63
Figure 1........................................................................................................................................................ 23
Figure 2........................................................................................................................................................ 25
Figure 3........................................................................................................................................................ 26
Figure 4........................................................................................................................................................ 27
Figure 5........................................................................................................................................................ 31
Figure 6........................................................................................................................................................ 35
Figure 7........................................................................................................................................................ 35
Figure 8........................................................................................................................................................ 36
Figure 9........................................................................................................................................................ 36
Figure 10...................................................................................................................................................... 38
Figure 11...................................................................................................................................................... 46
Figure 12...................................................................................................................................................... 47
Table 1 : Types of Network Traffic ............................................................................................................... 61
Table 2 : Workload Mixes 1.......................................................................................................................... 61
Table 3 : Workload Mixes 2.......................................................................................................................... 62
17
Acknowledgement
I have taken efforts in this project. However, it would not have been possible without the kind
support and help of many individuals and organizations. I would like to extend my sincere thanks
to all of them.
I am highly indebted to institute for their guidance and constant supervision as well as for
providing necessary information regarding the project & also for their support in completing the
Networking Technology assignment. I would like to express my gratitude towards my parents &
member for their kind co-operation and encouragement which help me in completion of this
project. I would like to express my special gratitude and thanks to industry persons for giving me
such attention and time. My thanks and appreciations also go to my colleague in developing the
project and people who have willingly helped me out with their abilities.
18
Task 01
1.1 Discuss the benefits and constraints of different networking systems types and
topologies
The use of technology in business can be a complex issue that requires a tremendous technical
expertise and should be left to qualified professionals. In some cases, network and computer
systems administrators may advocate the use of multiple operating systems.
This is known as virtualization, which has a number of advantages, such as the ability to
conserve energy or consolidate servers. Despite the advantages of running multiple operating
systems, there are some disadvantages as well.

Advantages and disadvantages of using different networks system and topologies
The three basic types of networks include: LAN, MAN and WAN.

Local Area Network
A network is said to be Local Area Network (LAN) if it is confined relatively to a small area. It
is generally limited to a building or a geographical area, expanding not more than a mile apart to
other computers.

Metropolitan Area Network
Metropolitan Area Network (MAN) covers larger geographic areas, such as cities. Often used by
local libraries and government agencies often to connect to citizens and private industries

Wide Area Network
Wide Area Networks (WANs) connect larger geographic areas .In this type of network dedicated
transoceanic cabling or satellite uplinks may be used.
Advantages

Speed
Sharing and transferring files within Networks are very rapid. Thus saving time, while
maintaining the integrity of the file
19

Cost
Individually licensed copies of many popular software programs can be costly.
Networkable versions are available at considerable savings. Shared programs, on a network
allows for easier upgrading of the program on one single file server, instead of upgrading
individual workstations.

Security
Sensitive files and programs on a network are passwords protected (established for specific
directories to restrict access to authorized users) or designated as "copy inhibit," so that you do
not have to worry about illegal copying of programs.

Centralized Software Management
Software can be loaded on one computer (the file server) eliminating that need to spend time and
energy installing updates and tracking files on independent computers throughout the building.

Resource Sharing
Resources such as, printers, fax machines and modems can be shared.
Disadvantages
 Server faults stop applications being available
 Network faults can cause loss of data
 Network fault could lead to loss of resources
 User work dependent upon network
 System open to hackers
 Decisions tend to become centralized
 Could become inefficient
 Could degrade in performance
 Resources could be located too far from users
Cost
While it can be cost-effective to have multiple operating systems in the long run, in the shortterm it can be cost-prohibitive to establish a system based on more than one operating system.
20
While there are many different types of operating platforms that can be integrated and used in
parallel with one another, it may be expensive to do so. Unless you are prepared to absorb the
initial cost of using more than one system, you may need to hold off until it is not costprohibitive for your budget.
Compatibility
Compatibility is another potential issue that you are likely to run into when attempting to set up
multiple operating systems. In some cases, the drivers you may need may not be available. This
is generally true with newer operating systems, where the manufacturers are still running beta
versions, or with really old operating systems, where the necessary drivers are no longer
available. Compatibility issues sometimes arise also when sharing data between systems.
Software and Support
Another potential issue that is closely related to the compatibility issue is that of the potential
difficulty in supporting and maintaining a system with multiple operating systems. The
complexity of configuring support software can make it difficult for system administrators to
integrate multiple operating systems.
Even with some of the more-popular and well-known software vendors like Microsoft, the ability
to support these complex systems can be overwhelming for even the most-advanced
administrators.
Opinions
Outside of the technical difficulties of having multiple operating systems, another potential
downfall of more than one operating system is sometimes seen in the attempt to have interagency
cooperation. When one department or agency relies heavily upon one operating system and
attempts to cooperate with another within the same organization, disagreements may occur over
which system to utilize when completing certain tasks.
Also, the same may be true regarding later decisions to upgrade systems or scrap one system
over another. This may exist in both camps, and they may fight to keep their operating system at
the expense of another.
21
Local Area Network: Local Area network is isolated network. Generally, it is built in a physical
location. Such as office, home etc. Computers are connected to each other by a small server and
also connected to the wide area network (Internet).
This types of networks are very useful for sharing data likes files, small or big document, play
network games etc.
Metro Politian Area Network (MAN)
Metropolitan area network is a large computer network where computers are connected with
each other from different geographical location.
Its structure and built process are quite similar with LAN the only difference its spans an entire
city or a selected are like college or university campus or a commercial area. We can get a shared
network connection form MAN.
Wide Area Network (WANs)
Wide area network is similar to a Local area network but here all other device connected to each
other by fiber-optic cables, telephone line or a satellite links.
Networking Topologies
BUS Topology
Bus topology is a network type in where every computer and network device is connected to
single cable.
Figure 1
22
Every node or device are individually linked up to successive other device or other node.
It’s a very simple network but it has sum troubleshooting network issues. such as if a node is not
working then how can anyone find the error node. Other way it has data redundancy issues.
Features of Bus Topology

It transmits data only in one direction

Every device is connected to a single cable
Advantages of Bus Topology

It is cost effective

Cable required is least compared to other network topology

Used in small networks

It is easy to understand

Easy to expand joining two cables together
Disadvantages of Bus Topology

Cables fails then whole network fails

If network traffic is heavy or nodes are more the performance of the network decreases

Cable has a limited length

It is slower than the ring topology
RING Topology
It is called ring topology because it forms a ring as each computer is connected to another
computer, with the last one connected to the first. Exactly two neighbors for each device.
23
It quite similar to bus network topologies. It has no termination like bus topologies. The main
reason is that this topologies has no end it related to each other like a circle.
Figure 2
This network has some fault such as difficulty of adding a new node to a token ring network.
Features of Ring Topology
A number of repeaters are used and the transmission is unidirectional
Date is transferred in a sequential manner that is bit by bit
Advantages of Ring Topology

Transmitting network is not affected by high traffic or by adding more nodes, as only the
nodes having tokens can transmit data

Cheap to install and expand
Disadvantages of Ring Topology

Troubleshooting is difficult in ring topology

Adding or deleting the computers disturbs the network activity
24

Failure of one computer disturbs the whole network
Star
In this network each and every node maintains an totally individual connection to a switch,
where all other nodes are connected. It has a direct connection with switch to node. The
weakness are need more wire to setup a network.
In this type of topology all the computers are connected to a single hub through a cable. This hub
is the central node and all others nodes are connected to the central node.
Figure 3
Features of Star Topology

Every node has its own dedicated connection to the hub

Acts as a repeater for data flow

Can be used with twisted pair, Optical Fibre or coaxial cable
Advantages of Star Topology

Fast performance with few nodes and low network traffic

Hub can be upgraded easily
25

Easy to troubleshoot

Easy to setup and modify

Only that node is affected which has failed rest of the nodes can work smoothly
Disadvantages of Star Topology

Cost of installation is high

Expensive to use
MESH Topology
It is a point-to-point connection to other nodes or devices. Traffic is carried only between two
devices or nodes to which it is connected. Mesh has n (n-2)/2 physical channels to link hn
devices.
Figure 4
Types of Mesh Topology
Partial Mesh Topology
In this topology some of the systems are connected in the same fashion as mesh topology but
some devices are only connected to two or three devices.
Full Mesh Topology
26
Each and every nodes or devices are connected to each other.
Features of Mesh Topology

Fully connected

Robust

Not flexible
Advantages of Mesh Topology

Each connection can carry its own data load

It is robust

Fault is diagnosed easily

Provides security and privacy
Disadvantages of Mesh Topology

Installation and configuration is difficult

Cabling cost is more

Bulk wiring is required
In this topology every node connected with each other node. It generally used in wireless
network. It need a large amount of overhead which very difficult to manage+
Hybrid
This is simply a topology referring to the case where more than one topology is utilized. It is the
combination of star and ring topology.
27
28
1.2 Evaluate the impact of current network technology, communication and standards
In conceptual models & standards, the term has been used to distinguish distributed computing
by smaller dispersed computers from the computer "monolith" of centralized mainframe
computers. But this distinction has largely disappeared as mainframes and their applications turn
to client / server model and become part of network computing.
In the normal client / server model, one server, sometimes called a daemon,switched on and wait
for customer demand. Typically,some program services from clients share a common server
program.
Both the client and server programs are often part of a larger program or application.In
connection with the Internet,the proposed network design include web browser is a client
requesting the service (delivery of web pages or files) from a web server (which is technically
called a server or the HTTP Hypertext Transport Protocol) on another computer somewhere on
the Internet. Similarly, the Water board Colombo center computer with TCP / IP installed allows
you to make client requests for files from File Transfer Protocol (FTP) server on another
computer on the Internet.
Features such as exchange e-mail, web access and database access, built on client-server model.
Users who access banking services from their computer using a client web browser to send
requests to a web server in the bank. The program in turn transmits the request to its own
database client program that sends requests to the database server at another bank computer to
retrieve account information.
The balance is returned to the bank's customer database, which in turn works back to the client
web browser displays the results to the user.Client-server model has become one of the central
idea of network computing. Many business applications written today use the client-server
model.
29
Client / Server and Multi-tier Design in Water board Colombo center
There is a client / server system is not only for the database. The Client / server design has a real
and direct benefit to software developers, without the size of your system. The objective of this
paper is to reveal the client / server to check the design considerations and technology, building
the Water board Colombo center design that is own client or server systems.
Proposed Server Hosting in Water board Colombo center
While the core technology that powers many modern servers is based upon similar processors,the
configuration and distribution of that computing power varies widely.When hosting your server
in
a
data
center
and
they
want
to
host
services
such
as
email,VoIP,Video
conferencing,intranet,ERP etc.
From central office which is located in Sri Lanka to other regional offices at
Indonesia,Malaysia,India and Singapore.It is important to have secure access to a central
repository of client data because services are provided both on-site and from their base in
Colombo. For both enterprise level companies as well as startups,selecting the right server
configuration can mean substantial savings in terms of economic and computing efficiency.
.
30
Figure 5
Proposed Server Hosting in Water board Colombo center
While the core technology that powers many modern servers is based upon similar processors,
the configuration and distribution of that computing power varies widely .When hosting your
server in a data center and they want to host services such as email, VoIP, Video conferencing,
intranet, ERP etc.
The Water board Colombo center is an upcoming call center. It has 02 branches with the head
office at Colombo and the other is located in Colombo. The building of the head office has 03
floors, and the Kandy is with 02 floors it is important to have secure access to a central
repository of client data because services are provided both on-site and from their base in
Colombo.
For both enterprise level companies as well as startups, selecting the right server configuration
can mean substantial savings in terms of economic and computing efficiency.
31
1.3 Discuss how protocols enable the effective utilization of different networking systems
The ability to provide flexible connectivity options while keeping closed user groups
(groups of users and resources isolated from non-group members) is vital in today's campus
networks.
The network virtualization-giving multiple groups access to the same physical network while
keeping them logically separate to a degree that they have no visibility into other groups-is a
requirement that has challenged network managers with in these proposed network design.
Initially, virtual LANs (VLANs) and the Spanning Tree Protocol offered a mechanism to divide
the LAN into virtual networks to address the need for separate workgroups within a common
network. This solution was effective and secure, but it did not scale well, nor was it easy to
manage as these campus LANs grew to encompass a large number of switches and global
locations.
Compelling Factors
Many factors promote the requirement to create closed user groups. The following are just a few
examples:
Varying levels of access privileges within an enterprise
Almost every enterprise needs solutions for granting different levels of access to customers,
vendors, and partners as well as employees on the campus LAN. A visiting vendor, for instance,
needs only to connect to the Internet while on campus, and the organization needs to help ensure
that the vendor cannot gain access to corporate resources.
Regulatory compliance
Some businesses are required by laws or rules to separate segments of a larger organization. For
example, in a financial company, banking needs to remain separate from trading. Office
buildings commonly require the separation of different departments, such as human resources
and customer service in a corporate setting, or a police department and a fire department in a
municipal office building.
32
Network consolidation
In mergers and acquisitions, there is often a need to integrate the acquired company's network
expeditiously.
Outsourcing
As outsourcing and offshoring proliferate, subcontractors must demonstrate absolute isolation of
information between clients. This is especially critical when a contractor services competing
companies.
The architecture of an end-to-end network virtualization solution targeted to satisfy the
requirements listed above can be separated in the following three logical functional areas:



Access control
Path isolation
Services edge
Each area performs several functions and must interface with the other functional areas to
provide the end-to-end solution.
Connectivity Requirements
The use of static ACLs at the edge of the network is the quickest way to provide traffic isolation,
controlling and restricting communications between the various user groups. Most customers are
comfortable with the use of ACLs to enforce security policies.
At the same time,using ACLs is recommended only in very specific scenarios where the network
connectivity requirements are hub-and-spoke (multi-to-one).The main limitation of the ACL
approach is the lack of scalability.The complexity of each distributed ACL is directly related to
two main factors:


The number of user groups that need to be supported
Connectivity requirements between user groups
33
Defining ACLs in scenarios with a large number of groups requiring any-to-any connectivity can
quickly become cumbersome from a management point of view. The goal is to propose this
approach when the connectivity requirement is hub-and-spoke, so that it is possible to create a
portable ACL template to be used across different spoke devices.
Two typical applications that require this type of connectivity are guest access (where the target
is providing access to the Internet as a centralized resource),and Network Admission Control
(NAC) remediation (where connectivity must be restricted between unhealthy endpoints and a
centralized remediation server).
Task 02
2.1 Discuss the role of software and hardware components
There are servers provide computing power to facilitate transfer of data across a network to
enable applications, operating systems, file transfer, email, printing and communications among
client computers. Each particular type of server is generally defined by its configuration and
software which enables it to communicate with intermediate client machines. As bandwidth rates
have increased, modern servers can handle a larger number of requests, distributing data transfer
across a series of servers through a cloud or cluster. Modern IT departments can work with a
variety of computing configurations to get the very most out of their servers.
Types of Server Hosting
While the core technology that powers many modern servers is based upon similar processors,
the configuration and distribution of that computing power varies widely. When hosting your
server in a data center, you’re able to harness resources to optimize the efficiency of data
transfer. For both enterprise level companies as well as startups, selecting the right server
configuration can mean substantial savings in terms of economic and computing efficiency.
34
Shared
As the single most economical form of hosting, server resources are shared across a wide variety
of users. While users have the ability to access their own partition (even on a dedicated IP
address), memory and transfer resources are shared across other sites.
Figure 6
Virtual
In recent years, virtual private servers (VPS) have become increasingly popular for users seeking
an intermediate choice between shared and dedicated servers.
Figure 7
http://www.iasl.com/images/2012/servermigrate.png(Accessed on - 2017/03/16)
Server Application Types
The application of server computing power to specific data needs has enabled hardware
specialization to improve uptimes, efficiency and reliability of networks. While a given hardware
35
setup can often power multiple applications, many times data centers are organized around
hardware for a specific purpose to make more efficiency use of the network.
Web servers
Web servers are optimized for data transfer speed, as well as security with extensive firewalls
and incoming request filters to protect against denial of service attempts.
Figure 8
Application Servers
A subset of traditional data servers, application servers are designed to power frameworks which
are involved in extensive processes related to a specific set of software. Application servers can
power web-based apps, games, output from scripts and programs as well as serving data from an
API (application protocol interface.)
Figure 9
36
Specialized Servers
File, Printer and Database Servers While modern servers often are involved in multiple tasks,
specialized servers provide dedicated support for file transfer, printer communications and
database queries.
For specific types of uses, having a dedicated server for a specific purpose can speed up
processing times and ensure sufficient resources are available during peak volumes.
Media Servers
With the growth of streaming audio and video, media servers provide an efficient way to
transfer high bandwidth files online. For dedicated media firms, businesses and producers alike,
investing in efficient hardware can lower operational costs from operating a server over time.
Mail (Exchange) Servers
Mail servers serve as an outbound client and inbound retrieval server for electronic messages,
commonly via the STMP (simple mail transfer) protocol. Serving as a transfer agent (TA), mail
servers as well
Proxy Servers
A proxy server like a middle man between a client and a real server, here client means a web
browser such as Internet explorer or chrome. When a client make a inquiry then web browser its
try to solve it, otherwise web browser forward the query to the real server. In this way a proxy
server reduce search time.
37
Figure 10
38
2.2 Discuss server types and selection requirement
The servers provide computing power to facilitate transfer of data across a network to enable
applications, operating systems, file transfer, email, printing and communications among client
computers. Each particular type of server is generally defined by its configuration and software
which enables it to communicate with intermediate client machines.
As bandwidth rates have increased, modern servers can handle a larger number of requests,
distributing data transfer across a series of servers through a cloud or cluster. Modern IT
departments can work with a variety of computing configurations to get the very most out of
their servers.
Types of Server Hosting
While the core technology that powers many modern servers is based upon similar processors,
the configuration and distribution of that computing power varies widely.
When hosting your server in a data center, you’re able to harness resources to optimize the
efficiency of data transfer. For both enterprise level companies as well as startups, selecting the
right server configuration can mean substantial savings in terms of economic and computing
efficiency.
Shared
As the single most economical form of hosting, server resources are shared across a wide variety
of users. While users have the ability to access their own partition (even on a dedicated IP
address), memory and transfer resources are shared across other sites.
Virtual
In recent years, virtual private servers (VPS) have become increasingly popular for users seeking
an intermediate choice between shared and dedicated servers.
39
Server Application Types
The application of server computing power to specific data needs has enabled hardware
specialization to improve uptimes, efficiency and reliability of networks. While a given hardware
setup can often power multiple applications, many times data centers are organized around
hardware for a specific purpose to make more efficiency use of the network.
Web servers
Web servers are optimized for data transfer speed, as well as security with extensive firewalls
and incoming request filters to protect against denial of service attempts.
Application Servers
A subset of traditional data servers, application servers are designed to power frameworks which
are involved in extensive processes related to a specific set of software. Application servers can
power web-based apps, games, output from scripts and programs as well as serving data from an
API (application protocol interface.)
40
Specialized Servers
File, Printer and Database Servers While modern servers often are involved in multiple tasks,
specialized servers provide dedicated support for file transfer, printer communications and
database queries.
For specific types of uses, having a dedicated server for a specific purpose can speed up
processing times and ensure sufficient resources are available during peak volumes.
Media Servers
With the growth of streaming audio and video, media servers provide an efficient way to
transfer high bandwidth files online. For dedicated media firms, businesses and producers alike,
investing in efficient hardware can lower operational costs from operating a server over time.
Mail (Exchange) Servers
Mail servers serve as an outbound client and inbound retrieval server for electronic messages,
commonly via the STMP (simple mail transfer) protocol. Serving as a transfer agent (TA), mail
servers as well
Proxy Servers
A proxy server like a middle man between a client and a real server, here client means a web
browser such as Internet explorer or chrome. When a client make a inquiry then web browser its
try to solve it, otherwise web browser forward the query to the real server. In this way a proxy
server reduce search time.
41
Types of Network Protocols
Ethernet
This technology is an enhancement of bus topology. IEEE currently controls Ethernet standards.
First it opens with the speed 10Mbps, later on it come with 100Mbps and now Gigabit Ethernet
operated at 1000Mbps. According to bus topology in Ethernet multiple computers share the
single link to communicate between them. They use CSMA/CD mechanism to become collision
free during transmission
Star topology
It's a system where a single device connected to all accessing devices like HUB & SPOKE. HUB
itself connected with all the SPOKEs. HUB accepts data from a sender an delivers to its
appropriate receiver (SPOKE).
Ring topology
It's a system where all the computer are connected with each other like first computer is
connected with second and so on until it reaches the last computer to connect with first one.
Bus topology
Computers are connected with a single long cable to communicate between them. The computers
connect with this have communicate only one at a time.
Token Ring
It users the ring topology for communication. When a computer wants to communication it uses
the token to send data. But it must be wait before the token arrives on its end then it stripes the
token out of ring and send the data and after transmission it again insert the token on the ring to
ensure that other stations which are going to communicate can use the token too.
Fiber Distributed Data Interconnect (FDDI) - It's also uses a ring topology but it using two rings
instead of one for communication. It operates 100Mbps so its faster than Ethernet. Two counter
rotating rings prevent the data loss in link failure even the node failure. This technology is
generally implemented in backbone
42
ATM (Asynchronous transfer mode)-ATM has been at first designed within the mid-1980s for
only voice usage, data, in addition to video apps. ATM is top-speed networking regular created to
support both voice in addition to data communications. ATM is usually used by the internet
suppliers on the non-public long-distance networks. ATM works in layer 2 of OSI model which
is data link layer over either fiber-optic or even twisted-pair cable.
ATM technology is built to enhance use and in addition to QoS on top-traffic networks. Without
routing and actually fixed-size cells, networks can easily deal with bandwidth below ATM. This
works on the fixed-length cell of 53 bytes, as opposed to the variable-length packets which might
be used by Ethernet. This permits for additional efficiency, as the devices do not have to
fragment and in addition to reassemble big packets.
The original ATM was already considerably faster than Ethernet; this surely could transfer voice,
data, and in addition to video media signals on as much as 500Mbps. Now days it is actually
quicker and it is being used by simply a big number of telecommunication and internet provider
as a core layer or backbone. ATM, similar to almost every other technology, will probably at
some point end up being exchanged by simply quicker successors.
For a network Infrastructure software and hardware requirement are essential. In hardware point
of view there are couple of list are included which is computers, router, switch, Ethernet cabling,
wireless device, telephone. In below we will discuss of these hardware.
Computer- This is use on workstation. But I will prefer laptop for user because its energy
efficiency & move able.
Router-Router actually works for control broadcast system. In our infrastructure we have three
office all office stuff share our local office data, there is a interoffice connectivity so we need
router for these.
Switch - Switch is a layer two device. Using these control Spanning tree protocol. For mange
user network we user manageable switch.
43
2.3 Discuss the inter-dependence of workstation hardware with network components
In this design part of the report I provide the information about the requirement gathering from
the Network design Management. The analysis of the raw requirement specifications and
providing the specific requirements is reported. These specific requirements are designed into a
network model and a WAN network model design is made.
This standard is specified by the task group for 802.11b of IEEE in late 1999 by extending the
WLAN standard 802.11 for the first time. To provide higher data rates 802.11b uses
Complementary Code Keying modulation technique that makes efficient use of the ratio
spectrum. This is first time to be more popular as WLAN standard which is adapted many
organizations and many products supporting it are also been manufactured.
Bandwidth
This supports the 1Mbps, 2Mbps, 5.5 Mbps and 11Mbps bandwidth comparable to the traditional
Ethernet networks. The boost of this speed from 1Mbps/2 Mbps to 11Mbps is by using DSSS
(Direct Sequence Spread Spectrum) modulation.
Wide area network is similar to a Local area network but here all other device connected to each
other by fiber-optic cables, telephone line or a satellite links.
Groups have been divided between one 28-port switch and one 16-port switch which are vLAN
configurable and is IEEE 802.1Q compliant. So the three groups are Red, Yellow and Blue.
While Red group and Yellow group are on same 28-port switch, Blue group is on different 16port switch.
The switch used for red and yellow group should be of 28-ports as they require totally 25 ports
and that are vLAN configurable and is IEEE 802.1Q compliant (12 ports for red group including
server port and router, 13 ports for yellow group including router port).
The switch used for blue group should be of 16-ports as they require 12 ports and that are vLAN
configurable and is IEEE 802.1Q compliant (11 ports for the blue group including server port
and a router port).
44
The router in this design is used to connect to the internet because it has the ability to
interconnect two different network technologies. The router used in this design not only
distributes the traffic flow but also allows network address translation and its vLAN compatible.
External Connectivity and Design Explanation
All users need access to the Email and Web. This is achieved by connecting 28-port layer 2
switch’s vLAN group Red to one of the router ports, and another vLAN group from same 28-port
switch i.e. vLAN group Yellow to another router port.
The vLAN group Blue which is on a 16-port switch is directly connected to another router port.
The design also specifies that only users who need access to server should be given the authority.
So the marketing specialists will not have access to any server so they are kept in different
vLAN.
The designers are given access to dedicated server, so the designers along with dedicated server
are kept on a single vLAN and other users excluding marketing specialists are given access to
database server, so they are kept in a separate vLAN. Therefore there has to be 3 different vLAN
groups in order to satisfy this design.
45
Task 03
3.1 Design a networked system to meet a given specification
Figure 11 : Network Diagram
46
LAN network Design for a Regional Department
Figure 12 : LAN Design
The Company Geographic distribution Departments to provide solutions which include new
LAN design, security, Manageability and performance, The Company is also planning to
implement IP phones using hosts configuration.
Ethernet cable:


10Gbps
1000 base X
The proposed Network Infrastructure expertise in the design and implementation of high-speed
networks, remote access solutions, and wireless networks including:

Business Requirement Assessment
47




WAN and LAN Infrastructure Design
IP Architecture and Address Planning
Wireless LAN Services
Remote Access Solutions
3.2 Evaluate the design and analyses user feedback
48
The Network architecture or diagram is the plan of a connections network. It is a structure for the
design of a networks physical mechanism and their functional association and design, its
operational values and events, as well as data formats use in its function.
In telecommunication, the plan of network architecture may also consist of a detailed report of
products and services deliver via a communications network, as well as detail rate and billing
structure under which services are compensated.
The network diagram is a visual representation of network architecture. It maps out the structure
of a network with a variety of different symbols and line connections. It is the ideal way to share
the layout of a network because the visual presentation makes it easier for users to understand
how items are connected as well.
Types and Uses of Network Diagrams

Bus

Linear

Ethernet

Token ring topology

Start Topology
IP address is short for Internet Protocol (IP) address. An IP address is an identifier for a computer
or device on a TCP/IP network. Networks using the TCP/IP protocol route messages based on the
IP address of the destination
IP address is short for Internet Protocol (IP) address. An IP address is an identifier for a computer
or device on a TCP/IP network. Networks using the TCP/IP protocol route messages based on the
IP address of the destination as well. The IPv4 is consist of four sets of numbers from 0 to 255,
The total number of IPv4 addresses ranges from 000.000.000.000 to 255.255.255.255. Because
256 = 28, there are 28 x 4 or 4,294,967,296 possible IP addresses. While this may seem like a
49
large number, it is no longer enough to cover all the devices connected to the Internet around the
world. Therefore, many devices now use IPv6 addresses.
IPv6
The IPv6 address format is much different than the IPv6 format. It contains eight sets of four
hexadecimal digits and uses colons to separate each block. An example of an IPv6 address is:
2602:0445:0000:0000:a93e:5ca7:81e2:5f9d.
50
Task 04
4.1 Implement a networked system based on a prepared design
VLAN on 1 Switch
Create two different VLANs. Check the visibility between hosts on different VLANs
Asymmetric VLANs on 1 Switch
Create three different asymmetric VLANs. Check the visibility between hosts
Spanning Tree: Root Bridge Election
Check the Root Bridge election between two switches with the same priority value, then assign a
lower priority to one of them, and test which one becomes the Root Bridge.
Spanning Tree: Root Path Cost Variation
Test how the Root Path Cost changes after a topology variation.
Spanning Tree: Port Blocking
Check how Spanning Tree Protocol avoids formation of cycles in the network, blocking
redundant links.
Spanning Tree: Port Blocking and VLANs
Check how Spanning Tree Protocol avoids formation of cycles in the network, blocking
redundant links, in presence of VLANs too.
Trunk IEEE 802.1Q
Create a Trunk 1Q, carrying two VLANs between two switches.
Multiple Spanning Tree: IEEE 802.1s
Create two Spanning Tree instances bound to different VLANs.
51
Different Root Bridge for different MSTI
Show that each MSTI can have a different Root Bridge.
Visibility between different STP Regions
Check visibility between different STP Regions with the same VLANs.
Root Bridge Election for CST & CIST
Create two or more different regions and check which bridge is the Root Bridge for CST
(Common Spanning Tree) and which one is the Root Bridge for CIST (Common Instance
Spanning Tree).
VLAN & Link Aggregation
Analyze the Network with Link Aggregation Control Protocol (802.3ad) enabled and disabled.
More VLANs & Link Aggregation
Analyze the Network with Link Aggregation Control Protocol (802.3ad) enabled and disabled, in
presence of more VLANs too.
Port Mirroring
Verify the functionality called Port Mirroring on switch Enterasys entry level.
Configuration BPDU
Use the port mirroring functionality in order to analyze the packages of type configuration
BPDU exchanges between entry level Enterasys switches.
Topology Change BPDU
Use the port mirroring functionality in order to analyze the Topology Change Notification
packets exchanged between entry level Enterasys switches.
52
Tagged BPDU
Use and hub connected to a PC and two switches in order to analyze the IEEE 802.1Q packets
exchanged between entry level Enterasys switches.
Policy Classification
Verify the functionality called Policy Classification on entry level Enterasys switches.
MST instances
Verify the functioning of creation of MST instance on entry level Enterasys switches.
Root Cost in MST Region
Analyze the root cost in MST Region on entry level Enterasys switches.
BPDU MST
Analyze the BPDU MST on entry level Enterasys switches
Topology Change in MST 1
Inspect the behavior of an MST switch when it is connected to a traditional ST switch.
Topology Change in MST 2
Inspect the behavior of an MST switch when it is connected to another MST switch of the same
region.
Topology Change in MST 3
Inspect the behavior of an MST switch when it is connected to an MST switch of another region.
53
4.2 Test the network system to meet user requirements
The most important feature of these industrial networks is that they guarantee bounded
transmission delays. However, NCSs based on industrial standards suffer from some
disadvantages, like high installation and maintenance costs, excessive weight of physical links
and difficulties with scalability and redundancy. One of the solutions enabling partial avoidance
of these problems is application of standard, inexpensive, easy to purchase and replace devices
typically used for office networking. To this class belongs Ethernet which currently dominates
general networking and seems to become an industrial standard in the nearest future.
The guided media, that form a basis of today plants, although quite reliable in nature, have
several disadvantages like limited scalability, quite high installation and maintenance costs, low
flexibility. Networks are more and more often applied in new domains, where usage of guided
media is impossible or inconvenient.
Such solutions based on 802.11 (Gast, 2005; WAVE), 802.15 (Gislason, 2008; Bluetooth
Specification, ZigBee Specification, 2008), or proprietary technologies are relatively
inexpensive, easy to deploy, and often allow to avoid installation of power supply cables. Some
of them are commercially available like WISA (Frey, 2008). The wireless media however suffer
from low reliability, limited capacity and are prone to noise and interferences.
It is well known that incorrect operation of the control system due to some hardware failure can
be dangerous or even catastrophic. Therefore in order to increase reliability of computer
controlled systems, redundancy realized by duplication or multiplication of sensors, actuators
and selected processing units is applied, especially in the case of systems responsible for control
of critical processes.
In network based control systems situation is additionally complicated by the possibility of
network failures and stochastically time-varying transmission delays introduced into feedback
loops by a network. Hence, resiliency of communication is crucial for satisfactory operation of
these systems.
54
4.3 Document and analyses test results against expected results
DATA center
Access control
Access control is the methods for imposing controls that allow or deny user access to network
resources, usually based on a user’s account or a group to which the user belongs. Access control
is security features that determine which resources users are permitted to access, what type of
access they are allowed, and how many simultaneous users can access a resource at the same
time. They ensure data privacy and protection and help maintain a productive computing
environment
User authentication
User authentication is a security feature that allows an administrator to control who has access to
the network and what users can do after they are logged on to the network. This might involve
confirming the identity of a person, the origins of an object, or assuring that a computer program
is a trusted one. Authentication is the process of determining the identity of a network user by
verifying a set of user credentials, typically a user ID and password
Firewalls
A firewall is a combination of hardware and software components that provide a protective
barrier between networks with different security levels. Rules for transmitting and receiving
information to and from the other network can be established for the firewall so that specific
types of items or addresses are not allowed to pass between the networks. It sits between the
computer and the rest of the network, and according to some criteria, it decides which
communication to allow, and which communication to block
55
Virus protection
Virus protection means securing data from viruses that is designed to destroy data or make the
computer or network operate inefficiently. Computer viruses are the programs that must be
triggered or executed before they can infect the computer system and spread to others.
Accessing the internet
Accessing the internet is the telephone communication system that also covers the world linking
telephones together. As with the telephone system, each device attached to the network can be
reached through a unique code that represents that device’s location.
56
4.4
Recommend potential enhancements for the networked systems

These are the preventative maintenance tasks are performed on:

Server and storage infrastructure

Desktop infrastructure

Network equipment

Backup and security systems

Each maintenance task can be performed at a standard frequency or on a specific
nominated basis appropriate for your environment. These tasks include:
Patch management

Log files review and corrective action

Security vulnerability testing

Anti-Virus and Anti-Spam management

Active directory account review

Archiving and data file management

Analyze with the Server Logs
Compare event logs errors and warnings against database of known errors. Investigate any
"unknown" errors for severity. Escalate any appropriate errors as Incidents via maintenance
team.
Server Patching
Review Critical updates and prepare for periodic application: Confirm a suitable Change
Window with the client, check backups, apply critical patches, reboot, and test server functions.
Optionally apply non-critical patches depending on server role
57
Server Disk Capacity
Check remaining disk capacity, all relevant partitions. Establish and maintain relevant free disk
space alert thresholds. Escalate any disk space threshold breaches as Incidents.
Server Optimization
Review the server for overall performance Examine disk I/O, RAM, CPU, check fragmentation,
perform relevant clean-up tasks
Database maintenance
Monitor MS Exchange and MS SQL server database size, Check Message queue length, Check
running processes.
Hardware components
The computers should have a minimum 2GHz Pentium 4s or better, A hard disk of each
computer should be minimum of 20 GB so that i can store the required data to run the network
features effectively. The required amount of RAM depends upon the operating system install on
each computer.
In case each computer is having windows-7 then the required amount of RAM should be 2-GB.
It is mandatory that each system operating system is updated with latest service pack.
Dedicate Servers in a Network
In a network dedicated server helps in making the network faster and easier to work with more
reliability. In a network a dedicated server helps in reducing the cost in an organization as a
reason that no other computer would be required that is biggest and fastest as a server. Here are
the different servers that would be used in the organization:
File Server
In any organizational network a file server provide centralized disk storage so that the client can
easily store their data over the file server. The purpose of the file server is to store and share files
and program over the network so that client can’t easily access them whenever they required.
58
File server also helps in preventing the users to update a single file at a same time. For database
file the lock can be applied so that the information regarding the organization can be protected.
Print Server
In any organization reduction of cost is the main emphasis. A dedicated server computer can be
use as a print server whose main purpose is to collect information being sent to a shared printer
by client and print it in an orderly manner.
Web Server
A Web server is a server computer that runs software that enables the computer to host an
Internet Web site.
The two most popular Web server programs are Microsoft IIS (Internet Information Services)
and Apache, an open-source.
Mail Server
A mail server is a server computer that handles the network’s e-mail needs. It’s configured with
e-mail server software, such as Microsoft Exchange Server.
Mail-server software must be compatible with e-mail program; Exchange Server, for example, is
designed to work with Microsoft Outlook, the e-mail client software that comes with Microsoft
Office.
Database Server
A database server is a server computer that runs database software, such as Microsoft SQL
Server 2005. Database servers are usually used along with customized business applications,
such as accounting or marketing systems.
59
Different types of network traffic used by different departments
Finance
Heavy/Light
Heavy/Light
Heavy/Light
Heavy/Light
Heavy/Light Heavy/Light
Marketing
Heavy/Light
Heavy/Light
Heavy/Light
Heavy/Light
Heavy/Light Heavy/Light
HR
Heavy/Light
Heavy/Light
Heavy/Light
Heavy/Light
Heavy/Light Heavy/Light
IT
Heavy/Light
Heavy/Light
Heavy/Light
Heavy/Light
Heavy/Light Heavy/Light
Legal
Heavy/Light
Heavy/Light
Heavy/Light
Heavy/Light
Heavy/Light Heavy/Light
Table 1 : Types of Network Traffic
Workload Mixes
Below three charts are containing the different workload mixes types with different time phase
and traffic levels.
Workload Mixes 1
89.30a.m to 11.30p.m
Applications
Data Base Server
Email application
File Transfer
File Print server
Telnet protocol
Video Conferencing
Finance
Heavy
Light
Heavy
Heavy
Light
Marketing
Light
Light
Heavy
Heavy
Light
HR
Heavy
Light
Light
Heavy
Heavy
IT
Heavy
Light
Light
Heavy
Light
Legal
Heavy
Heavy
Heavy
Heavy
Light
service
Website application
Light
Heavy
Light
Light
Heavy
Light
Light
Heavy
Light
Heavy
Table 2 : Workload Mixes 1
Workload Mixes 2
Applications
Data Base Server
Email application
File Transfer
12.30p.m to 3.30p.m
Finance
Heavy
Heavy
Light
Marketing
Light
Light
Light
HR
Light
Heavy
Heavy
IT
Heavy
Light
Light
Legal
Light
Light
Heavy
60
File Print
Telnet
Video Con.
Web
Heavy
Light
Heavy
Heavy
Heavy
Heavy
Light
Heavy
Light
Heavy
Light
Light
Heavy
Light
Light
Light
Light
Light
Light
Heavy
Table 3 : Workload Mixes 2
References
[1] Berkelaar, B.L. (2009). No punctuation: Searching for an architecture of time in the culture of
efficiency. In S. Kleinman (Ed.), The culture of efficiency (pp. 88-105). New York: Peter Lang.
[2] Browning, L. D, Greene, R. W., Sitkin, S. B., Sutcillffe, K. M.m & Obstfeld, D. (2009).
Constitutive complexity: Military entrepreneurs and the synthetic character of
[3] communication flows. In L. L. Putnam and A. M. Nicotera (Eds.), Building Theories of
organization: The constitutive role of Communication. New York: Routledge.
61
[4] Kisselburgh, L., Berkelaar, B. L., & Buzzanell, P. M. (2009). Discourse, gender, and the
meanings of work: Rearticulating science, technology, and engineering careers through
communicative lenses. In C. Beck (Ed.), Communication yearbook 33 (pp. 258-299). New York:
Routledge.
[5] Peña, J., & Hancock, J. T., & Merola, N. A. (2009). The priming effects of avatars in virtual
settings. Communication Research, 36, 838-856.
[6] Putnam, L., Kisselburgh, L., Berkelaar, B., Buzzanell, P. M., Mastronardi, M., Jackson, M.,
Stoltzfus, K., Jorgenson, J., & Wang, J. (2009). Conversations about women in STEM careers:
[7] The impact of communication research in creating occupational and social change in a global
information economy. In L. Harter, M. Dutta, & C. Cole (Eds.), Communicating for social
impact: Engaging communication theory, research, and pedagogy (pp. 47-62). Cresskill, NJ:
Hampton.
[8] Shapiro, M. A., & Peña, J. (2009). Generalizability and validity in video game research. In U.
Ritterfeld, M. J. Cody, & P. Vorderer (Eds.), Serious games: Mechanisms and effects (pp. 389403). Mahwah, NJ: Lawrence Erlbaum.
[9] Stephens, K. K., & Davis, J. D. (2009). The social influences on electronic multitasking in
organizational meetings. Management Communication Quarterly, 23, 63-83.
[10] Stephens, K. K., & Malone, P. (2009). If the organizations won’t give us information…: The
use of multiple new media for crisis technical translation and dialogue.
62
Download